Stopping Intruders: Using A Wireless Honeypot to Track Hackers

Today's networks will have a wireless component on them in some
capacity. This includes SCADA and industrial, LAN's and even vehicles.
This honeypot, called romanHunter, will demonstrate one way to detect
and gather data on whether or not your networks are likely being
attacked. This information can be used to alter the overall security
posture of the organization. This webinar will discuss these topics and
include a demonstration with theory on how to apply this same ideology
on other platforms.

As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

Qualifying participants will earn 1 CPE credit.

Learning Objectives

- Discover what it takes to successfully implement GRC at your organization by:
- Unifying controls for IT risk and compliance.
- Enabling IT governance by establishing accountability.
- Aligning technology and processes for efficiency and consistency.
- Learn how do you measure the cost and ROI of an implementation, so that you can present the case to management.
- Identify the maturity and design of your GRC program, and plan on an appropriate GRC implementation given your current state.

GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

-The ISF’s phased approach to GDPR implementation
-Ways to determine the criticality of data and how to protect it appropriately
-The urgent actions that a business can take to get GDPR compliance started
-Common myths surrounding the GDPR, and guidance on cutting through the noise.

The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. While GDPR is a regulation enacted by the European Union, if your company has global operations or reaches a worldwide audience, your company is also likely subject to GDPR. This session will help you build your GDPR preparation checklist based on the key elements of a GDPR compliance program for companies based outside the EU, explain GDPR provisions most relevant to the use of security solutions, and discuss questions you should be asking your security team and service providers to understand the features available within your solutions to help you comply with GDPR.

The General Data Protection Regulation (GDPR) is a key legislation going into effect in May that it will affect all organizations that handle, store or pass through data of EU citizens.

Join this panel of Governance, Risk, Compliance and Security experts for an interactive Q&A as they discuss the importance of being GDPR-compliant:
- What GDPR means for cyber security
- GDPR requirements around data collection and governance, exposure and breach disclosure
- Evaluating your cyber risk
- Recommendations for achieving compliance post-deadline day
- Other regulation on the horizon

The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.

The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.

About the Speaker:
Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.

In this webinar, Dr. Jones Lukose will tell us about the impact of the GDPR on the International Criminal Court. Compliance is a major issue, and in this session, you will learn about the obligations, challenges, processes and the future for the International Criminal Court using the Micro Focus solutions Content Manager, ControlPoint and IDOL.

The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.

Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.

Learning Objectives:

- Learn how to prepare for GDPR implementation
- Identify the real life challenges of compliance
- Learn about prioritizing plans and actions to effectively prepare for data protection
- Discover some of the benefits, approaches, and tools to comply with the GDPR

Brought to you by the Vivit Automation & Cloud Builders Special Interest (SIG) Group.

Attend this webinar to receive a live demonstration of public cloud service brokering, aggregation and governance using the Micro Focus Hybrid Cloud Management solution. HCM allows IT to easily aggregate public cloud resources into an end-user catalog, while providing governance and analytics to ensure business unit consumption is visible and within budget. In addition, learn how improved control of public cloud spending can help you start building a strong business case for cloud management.

The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.

What are the privacy & security requirements for being GDPR compliant? -
- Why we should think beyond GDPR when it comes to improving data security?
- Are you compliant / ready when GDPR goes into effect next month?
- What are some last-minute items to complete before the GDPR deadline?

Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.

Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

Qualifying participants will earn 1 CPE credit.

Learning Objectives:

- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches

The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

Join this panel of world-class experts:

Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program

If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.

In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
• An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
• Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
• How to create a hybrid standard
• Sampling your standard with content, and using this to drive adjustments and fine tuning
• How to integrate data classification with record retention

We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.

About the Presenter:
Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.

In many ways, creating your GDPR Data Protection Policy is the easy part. As the May deadline approaches, the real work begins on finding all your Privacy Data not only in databases but also GDPR content scattered across file shares, desktops and other storage repositories around the world.

On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

Join this interactive panel of experts as they discuss:
- What is GDPR?
- Why should you be GDPR-compliant?
- How to achieve compliance?
- Steps your organization should take today to prepare for GDPR
- Other GDPR considerations

The General Data Protection Regulation (GDPR), a key legislation covering privacy rights, data security, data control, and governance, is going into effect in May 2018. As organizations are scrambling to achieve GDPR compliance before the May 25th deadline, some are still not clear on the exact GDPR requirements.

Join this panel of experts as they discuss:
- The regulatory landscape in 2018
- What GDPR means for you and your organization
- GDPR requirements around data collection and governance, exposure and breach disclosure, identity and privacy
- Evaluating your cyber risk
- Last minute changes your organization needs to make
- Failure to comply & fines
- Recommendations for achieving compliance and other regulation on the horizon.

Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.